A Review of Advanced Algebraic Approaches Enabling Network Tomography for Future Network Infrastructures
Abstract
:1. Introduction
2. Network Tomography Model and Classification Overview
2.1. Linear Measurement Model and Basic Definitions
2.2. Network Tomography Classification Overview
- Link-level parameter estimation: vector consists of end-to-end traffic measurements such as accounts of delivered/lost packets and time delays (differences) between packet transmissions and receptions. The unknown variables (i.e., vector ) are the link metrics, which are typically additive, meaning that the path metric obtained by combining multiple serial links is the sum of the individual link metrics. Time delays are a good example of an additive metric, whereas a multiplicative metric, such as loss rates, can be expressed in an additive form by using the logarithmic function. Since these end-to-end path measurements are carried out between pairs of nodes with monitoring capabilities, the decision of which nodes will be chosen as monitors becomes a key problem. This category can be further divided based on the different application contexts and the specific link metric used (e.g., loss tomography [8,9,10], delay tomography [11,12,13], bandwidth tomography [14], etc.)
- Path-level traffic intensity estimation [15,16,17]: the goal is to estimate the traffic volume (or to infer the distribution of the flowing traffic) of end-to-end routes between all pairs of nodes in the network based on the observed traffic volumes on individual links. At a practical level, the involved link aggregate data are acquired by monitoring the total number of packets traversing the respective nodes. The combination of the traffic intensities of all these origin–destination pairs forms the origin–destination (OD) traffic matrix. Hence, this category aims at the inference of OD traffic matrices () based on (aggregated) link traffic counts (). This is the original NT problem studied in [18].
- Topology inference [19,20,21,22,23]: the network topology, which is expressed by the routing matrix , is unknown. Hence, in this category, the goal is the inference of the topology based on end-to-end measurements conducted at the network edge and obtained without the cooperation and the participation of the internal nodes. These measurements evaluate the degree of correlation between receivers. Network topology is usually examined in terms of the logical topology, which is defined by the branching points between paths to different destination nodes. Internal nodes where no branching of traffic occurs do not appear in the logical topology. The central idea of the methods in this category is to obtain a measure of similarity between pairs of terminal nodes (i.e., source and destination) by means of end-to-end measurements that behave as a monotonically increasing function of the number of shared links or common queues between the two receiving nodes. Knowledge of the pairwise similarity metric values under an additive metric is sufficient to completely identify the logical topology by employing various statistical techniques such as hierarchical clustering, maximum likelihood, and Bayesian inference.
3. Network Coding Enabled Network Tomography
3.1. Topology Inference
3.2. Loss Estimation
4. Compressed Sensing Enabled Network Tomography
- enable accurate reconstruction of from when is known to be sparse;
- use fast decoding algorithm; and
- make the least possible measurements (maximum achievable compression of ) [41].
4.1. Delay Estimation
4.2. Loss Estimation
5. Discussion
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
NT | Network Tomography |
QoS | Quality of Service |
ICMP | Internet Control Message Protocol |
EM | Expectation-Maximization |
MCMC | Markov Chain Monte Carlo |
MoM | Method of Moments |
NC | Network Coding |
CS | Compressed Sensing |
OD | Origin-Destination |
RLNC | Random Linear Network Coding |
XOR | Exclusive Or |
IRV | Impulse Response Vector |
NRSC | Network Reed-Solomon Coding |
DAG | Directed Acyclic Graph |
SCFS | Smallest Consistent Failure Set |
LA | Linear Algebraic |
LA-NE | Linear Algebraic with Normal Equations |
LA-RS | Linear Algebraic with Row Selection |
BP | Belief Propagation |
WSN | Wireless Sensor Network |
MLE | Maximum Likelihood Estimator |
LP | Linear Programming |
i.i.d. | independent and identically distributed |
MSE | Mean Squared Error |
MT | Multicast Tree |
RMT | Reversed Multicast Tree |
MAP | Maximum A-Posteriori |
WSCP | Weighted Set Cover Problem |
GFT | Graph Fourier Transform |
BS | Base Station |
RTT | Round Trip Time |
CDS | Connected Dominating Set |
RIP | Restricted Isometry Property |
MIS | Maximal Independent Set |
FPR | False Positive Rate |
DR | Detection Rate |
RMSE | Root Mean Square Error |
References
- Coates, A.; Hero, A.O., III; Nowak, R.; Yu, B. Internet tomography. IEEE Signal Process. Mag. 2002, 19, 47–65. [Google Scholar] [CrossRef]
- Castro, R.; Coates, M.; Liang, G.; Nowak, R.; Yu, B. Network Tomography: Recent Developments. Stat. Sci. 2004, 19, 499–517. [Google Scholar] [CrossRef]
- Ahlswede, R.; Cai, N.; Li, S.Y.; Yeung, R. Network information flow. IEEE Trans. Inf. Theory 2000, 46, 1204–1216. [Google Scholar] [CrossRef]
- Li, S.Y.; Yeung, R.; Cai, N. Linear network coding. IEEE Trans. Inf. Theory 2003, 49, 371–381. [Google Scholar] [CrossRef] [Green Version]
- Rani, M.; Dhok, S.B.; Deshmukh, R.B. A Systematic Review of Compressive Sensing: Concepts, Implementations and Applications. IEEE Access 2018, 6, 4875–4894. [Google Scholar] [CrossRef]
- Hayashi, K.; Nagahara, M.; Tanaka, T. A User’s Guide to Compressed Sensing for Communications Systems. IEICE Trans. Commun. 2013, E96.B, 685–712. [Google Scholar] [CrossRef] [Green Version]
- Qaisar, S.; Bilal, R.M.; Iqbal, W.; Naureen, M.; Lee, S. Compressive sensing: From theory to applications, a survey. J. Commun. Netw. 2013, 15, 443–456. [Google Scholar] [CrossRef]
- Cascares, R.; Duffield, N.G.; Horowitz, J.; Towsley, D.F. Multicast-based inference of network-internal loss characteristics. IEEE Trans. Inf. Theory 1999, 45, 2462–2480. [Google Scholar] [CrossRef] [Green Version]
- Tsang, Y.; Coates, M.; Nowak, R. Passive network tomography using EM algorithms. In Proceedings of the 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing, Salt Lake City, UT, USA, 7–11 May 2001. [Google Scholar] [CrossRef]
- Duffield, N.; Presti, F.L.; Paxson, V.; Towsley, D. Network loss tomography using striped unicast probes. IEEE/ACM Trans. Netw. 2006, 14, 697–710. [Google Scholar] [CrossRef] [Green Version]
- Presti, F.L.; Duffield, N.; Horowitz, J.; Towsley, D. Multicast-based inference of network-internal delay distributions. IEEE/ACM Trans. Netw. 2002, 10, 761–775. [Google Scholar] [CrossRef] [Green Version]
- Nie, X.; Lu, C.; Zhai, S.; Li, L.; Wang, X. Research on End-to-End Delay Variation Feature Extraction Method for Nonstationary Network. In Proceedings of the 2017 4th International Conference on Information Science and Control Engineering (ICISCE), Changsha, China, 21–23 July 2017. [Google Scholar] [CrossRef]
- Rad, N.E.; Ephraim, Y.; Mark, B.L. Delay Network Tomography Using a Partially Observable Bivariate Markov Chain. IEEE/ACM Trans. Netw. 2017, 25, 126–138. [Google Scholar] [CrossRef]
- Dey, B.K.; Manjunath, D.; Chakraborty, S. Estimating network link characteristics using packet-pair dispersion: A discrete-time queueing theoretic analysis. Comput. Netw. 2011, 55, 1052–1068. [Google Scholar] [CrossRef]
- Zhang, Y.; Roughan, M.; Duffield, N.; Greenberg, A. Fast accurate computation of large-scale IP traffic matrices from link loads. ACM SIGMETRICS Perform. Eval. Rev. 2003, 31, 206. [Google Scholar] [CrossRef]
- Zhao, E.; Tan, L. A PCA based optimization approach for IP traffic matrix estimation. J. Netw. Comput. Appl. 2015, 57, 12–20. [Google Scholar] [CrossRef]
- Mardani, M.; Giannakis, G.B. Estimating Traffic and Anomaly Maps via Network Tomography. IEEE/ACM Trans. Netw. 2016, 24, 1533–1547. [Google Scholar] [CrossRef] [Green Version]
- Vardi, Y. Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data. J. Am. Stat. Assoc. 1996, 91, 365–377. [Google Scholar] [CrossRef]
- Castro, R.; Coates, M.; Nowak, R. Likelihood Based Hierarchical Clustering. IEEE Trans. Signal Process. 2004, 52, 2308–2321. [Google Scholar] [CrossRef]
- Duffield, N.; LoPresti, F. Network Tomography from Measured End-to-End Delay Covariance. IEEE/ACM Trans. Netw. 2004, 12, 978–992. [Google Scholar] [CrossRef] [Green Version]
- Ni, J.; Xie, H.; Tatikonda, S.; Yang, Y. Efficient and Dynamic Routing Topology Inference from End-to-End Measurements. IEEE/ACM Trans. Netw. 2010, 18, 123–135. [Google Scholar] [CrossRef]
- Ni, J.; Tatikonda, S. Network Tomography Based on Additive Metrics. IEEE Trans. Inf. Theory 2011, 57, 7798–7809. [Google Scholar] [CrossRef]
- Eriksson, B.; Dasarathy, G.; Barford, P.; Nowak, R. Efficient Network Tomography for Internet Topology Discovery. IEEE/ACM Trans. Netw. 2012, 20, 931–943. [Google Scholar] [CrossRef] [Green Version]
- Lun, D.S.; Médard, M.; Koetter, R.; Effros, M. On coding for reliable communication over packet networks. Phys. Commun. 2008, 1, 3–20. [Google Scholar] [CrossRef] [Green Version]
- Fragouli, C.; Boudec, J.Y.L.; Widmer, J. Network coding. ACM SIGCOMM Comput. Commun. Rev. 2006, 36, 63. [Google Scholar] [CrossRef]
- Sanders, P.; Egner, S.; Tolhuizen, L. Polynomial time algorithms for network information flow. In Proceedings of the Fifteenth Annual ACM Symposium on Parallel Algorithms and Architectures—SPAA ’03, San Diego, CA, USA, 7–9 June 2003. [Google Scholar] [CrossRef]
- Fragouli, C.; Markopoulou, A.; Diggavi, S. Topology inference using network coding. In Proceedings of the 44th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, 27–30 September 2006. [Google Scholar]
- Sattari, P.; Fragouli, C.; Markopoulou, A. Active topology inference using network coding. Phys. Commun. 2013, 6, 142–163. [Google Scholar] [CrossRef] [Green Version]
- Rabbat, M.; Coates, M.; Nowak, R. Multiple-Source Internet Tomography. IEEE J. Sel. Areas Commun. 2006, 24, 2221–2234. [Google Scholar] [CrossRef]
- Jithin, R.; Dey, B.K. Exact topology inference for DAGs using network coding. In Proceedings of the 2012 International Symposium on Network Coding (NetCod), Cambridge, MA, USA, 29–30 June 2012. [Google Scholar] [CrossRef]
- Yao, H.; Jaggi, S.; Chen, M. Passive Network Tomography for Erroneous Networks: A Network Coding Approach. IEEE Trans. Inf. Theory 2012, 58, 5922–5940. [Google Scholar] [CrossRef]
- Duffield, N. Network Tomography of Binary Network Performance Characteristics. IEEE Trans. Inf. Theory 2006, 52, 5373–5388. [Google Scholar] [CrossRef]
- Mohammad, H.F.; Roy, S.; Bai, L.; Lydick, C. Link failure monitoring via network coding. In Proceedings of the IEEE Local Computer Network Conference, Denver, CO, USA, 10–14 October 2010. [Google Scholar] [CrossRef] [Green Version]
- Gui, J.; Shah-Mansouri, V.; Wong, V.W.S. A Linear Algebraic Approach for Loss Tomography in Mesh Topologies Using Network Coding. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010. [Google Scholar] [CrossRef] [Green Version]
- Gui, J.; Shah-Mansouri, V.; Wong, V.W.S. Accurate and Efficient Network Tomography Through Network Coding. IEEE Trans. Veh. Technol. 2011, 60, 2701–2713. [Google Scholar] [CrossRef] [Green Version]
- Shah-Mansouri, V.; Wong, V.W.S. Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding. In Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, FL, USA, 6–10 December 2010. [Google Scholar] [CrossRef] [Green Version]
- Sattari, P.; Markopoulou, A.; Fragouli, C.; Gjoka, M. A Network Coding Approach to Loss Tomography. IEEE Trans. Inf. Theory 2013, 59, 1532–1562. [Google Scholar] [CrossRef]
- Sattari, P.; Markopoulou, A.; Fragouli, C. Maximum Likelihood Estimation for Multiple-Source Loss Tomography with Network Coding. In Proceedings of the 2011 International Symposium on Networking Coding, Beijing, China, 25–27 July 2011. [Google Scholar] [CrossRef]
- Berinde, R.; Gilbert, A.C.; Indyk, P.; Karloff, H.; Strauss, M.J. Combining geometry and combinatorics: A unified approach to sparse signal recovery. In Proceedings of the 2008 46th Annual Allerton Conference on Communication, Control, and Computing, Urbana-Champaign, IL, USA, 23–26 September 2008. [Google Scholar] [CrossRef] [Green Version]
- Xu, W.; Hassibi, B. Efficient Compressive Sensing with Deterministic Guarantees Using Expander Graphs. In Proceedings of the 2007 IEEE Information Theory Workshop, Tahoe City, CA, USA, 2–6 September 2007. [Google Scholar] [CrossRef] [Green Version]
- Firooz, M.H.; Roy, S. Link Delay Estimation via Expander Graphs. IEEE Trans. Commun. 2014, 62, 170–181. [Google Scholar] [CrossRef] [Green Version]
- Donoho, D.L.; Elad, M. Optimally sparse representation in general (nonorthogonal) dictionaries via ℓ1 minimization. Proc. Natl. Acad. Sci. USA 2003, 100, 2197–2202. [Google Scholar] [CrossRef] [Green Version]
- Fattaholmanan, A.; Rabiee, H.R.; Siyari, P.; Soltani-Farani, A.; Khodadadi, A. Peer-to-Peer Compressive Sensing for Network Monitoring. IEEE Commun. Lett. 2015, 19, 38–41. [Google Scholar] [CrossRef]
- Wang, W.; Gan, X.; Bai, W.; Wang, X.; Tian, X. Compressed sensing based network tomography using end-to-end path measurements. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017. [Google Scholar] [CrossRef]
- Fan, X.; Li, X. Delay tomography via compressed sensing under exponential distribution. In Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 13–16 December 2017. [Google Scholar] [CrossRef]
- Nakanishi, K.; Hara, S.; Matsuda, T.; Takizawa, K.; Ono, F.; Miura, R. Reflective Network Tomography Based on Compressed Sensing. Procedia Comput. Sci. 2015, 52, 186–193. [Google Scholar] [CrossRef]
- Nakanishi, K.; Hara, S.; Matsuda, T.; Takizawa, K.; Ono, F.; Miura, R. Synchronization-Free Delay Tomography Based on Compressed Sensing. IEEE Commun. Lett. 2014, 18, 1343–1346. [Google Scholar] [CrossRef] [Green Version]
- Kinsho, H.; Tagyo, R.; Ikegami, D.; Matsuda, T.; Takahashi, A.; Takine, T. Heterogeneous delay tomography based on graph fourier transform in mobile networks. In Proceedings of the 2017 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), Naples, FL, USA, 16–18 May 2017. [Google Scholar] [CrossRef]
- Wei, H.T.; Hsieh, S.H.; Hwang, W.L.; Liao, C.S.; Lu, C.S. Link Delay Estimation Using Sparse Recovery for Dynamic Network Tomography. arXiv 2018, arXiv:1812.00369. [Google Scholar]
- Wang, M.; Xu, W.; Mallada, E.; Tang, A. Sparse Recovery With Graph Constraints. IEEE Trans. Inf. Theory 2015, 61, 1028–1044. [Google Scholar] [CrossRef]
- Nguyen, H.X.; Thiran, P. The Boolean Solution to the Congested IP Link Location Problem: Theory and Practice. In Proceedings of the IEEE INFOCOM 2007—26th IEEE International Conference on Computer Communications, Barcelona, Spain, 6–12 May 2007. [Google Scholar] [CrossRef] [Green Version]
- Fan, X.; Li, X.; Zhang, J. Compressed sensing based loss tomography using weighted ℓ1 minimization. Comput. Commun. 2018, 127, 122–130. [Google Scholar] [CrossRef]
- Chen, J.; Qi, X.; Wang, Y. An efficient solution to locate sparsely congested links by network tomography. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014. [Google Scholar] [CrossRef]
- Takemoto, K.; Matsuda, T.; Takine, T. Sequential Loss Tomography Using Compressed Sensing. IEICE Trans. Commun. 2013, E96.B, 2756–2765. [Google Scholar] [CrossRef]
- Otsu, N. A Threshold Selection Method from Gray-Level Histograms. IEEE Trans. Syst. Man Cybern. 1979, 9, 62–66. [Google Scholar] [CrossRef] [Green Version]
- Morita, T.; Matsuda, T.; Takine, T. Spatially dependent loss tomography for multihop wireless networks. In Proceedings of the 2016 International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, 13–15 January 2016. [Google Scholar] [CrossRef]
- Bandara, V.W.; Jayasumana, A.P.; Whitner, R. An adaptive compressive sensing scheme for network tomography based fault localization. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014. [Google Scholar] [CrossRef]
- Donoho, D. Compressed sensing. IEEE Trans. Inf. Theory 2006, 52, 1289–1306. [Google Scholar] [CrossRef]
- Candès, E.J.; Romberg, J.K.; Tao, T. Stable signal recovery from incomplete and inaccurate measurements. Commun. Pure Appl. Math. 2006, 59, 1207–1223. [Google Scholar] [CrossRef] [Green Version]
- Beck, A.; Teboulle, M. A Fast Iterative Shrinkage-Thresholding Algorithm for Linear Inverse Problems. SIAM J. Imaging Sci. 2009, 2, 183–202. [Google Scholar] [CrossRef] [Green Version]
Network Coding | Compressed Sensing | Loss | Delay | Topology | Comments | |
---|---|---|---|---|---|---|
Fragouli et al. [27] | ✓ | ✓ | binary trees | |||
Sattari et al. [28] | ✓ | ✓ | m-ary trees, M-by-N DAGs | |||
Jithin et al. [30] | ✓ | ✓ | M-by-N DAGs, asynchronous sources | |||
Yao et al. [31] | ✓ | ✓ | RLNC, NRSC, passive tomography | |||
Mohammad et al. [33] | ✓ | RLNC, congested link location | ||||
Gui et al. [34] | ✓ | ✓ | mesh DAG topologies | |||
Gui et al. [35] | ✓ | ✓ | mesh DAG topologies, minimum probe size | |||
Shah-Mansouri et al. [36] | ✓ | ✓ | WSN, RLNC, subspace property, virtual sources | |||
Sattari et al. [37] | ✓ | ✓ | trees and general topologies | |||
Sattari et al. [38] | ✓ | ✓ | trees with multiple sources | |||
Fan et al. [52] | ✓ | ✓ | weighted minimization, expander graphs | |||
Chen et al. [53] | ✓ | ✓ | link congestion probabilities, greedy iterative algorithm | |||
Takemoto et al. [54] | ✓ | ✓ | measurement paths construction, low-quality link detection | |||
Morita et al. [56] | ✓ | ✓ | wireless multihop networks, GFT, spatially dependent channels | |||
Bandara et al. [57] | ✓ | ✓ | scalable, adaptive fault localization | |||
Firooz et al. [41] | ✓ | ✓ | k-identifiability, expander graphs | |||
Fattaholmanan et al. [43] | ✓ | collaborative distributed framework, individual matrix for every node | ||||
Wang et al. [44] | ✓ | ✓ | expander graphs, minimization | |||
Fan et al. [45] | ✓ | ✓ | synchronization errors, constrained optimization | |||
Nakanishi et al. [46] | ✓ | ✓ | no clock synchronization, reflective NT | |||
Nakanishi et al. [47] | ✓ | ✓ | synchronization errors, differential routing matrix | |||
Kinsho et al. [48] | ✓ | ✓ | mobile networks, GFT & passive measurements | |||
Wei et al. [49] | ✓ | ✓ | dynamic networks, line graph model |
Description of Key Points, Advantages, and Concise Performance Evaluation | |
---|---|
Fragouli et al. [27] | deterministic topology recovery in one pass for binary tree networks without packet losses; rapid topology inference after only a few probes in the presence of packet losses; the probability of error is increasing with the loss rates of the links and decreasing with the number of probes per iteration |
Sattari et al. [28] | extends [27] to (full or general) m-ary undirected trees; accurately distinguishes among all different 2-by-2 components for DAGs; more accurate with less experiments compared to [29]; smaller complexity and less bandwidth consumption than [31] |
Jithin et al. [30] | deterministically recovers the exact DAG logical topology with a single probing experiment and one probe packet traversing each link; contrary to [28,29], no synchronization among sources is required |
Yao et al. [31] | algorithms with polynomial time computational complexity in the network size for topology inference under random errors and failure localization under random and adversarial errors; adversarial error localization under NRSC does not require prior knowledge of the topology |
Mohammad et al. [33] | sufficient conditions for successfully identifying a single congested link in any logical network; speed (length of training sequence)/complexity (size of NC packets) trade-off |
Gui et al. [34] | lower bound on probe size for valid end-to-end observations under NC; consistent estimators of link loss rates based on LA approach; LA achieves better accuracy (lower RMSE) than BP for |
Gui et al. [35] | extends [34]; LA using Method of Row Selection (LA-RS) has lower complexity but similar RMSE compared to LA using Method of Normal Equations (LA-NE); bandwidth consumption/estimation accuracy trade-off; LA-RS is more accurate than the BP approach; RMSE decreases as the average link success rate increases; a graph with more sources achieves better estimation accuracy; RMSE linearly increases with the number of nodes |
Sattari et al. [38] | proposes a low complexity algorithm to compute MLEs of link loss rates in multiple-source tree networks with multicast and NC capabilities; the algorithm is efficient as the computation at each node is at worst proportional to the tree depth |
Sattari et al. [37] | extends the work in [38]; NC loss tomography is more efficient than traditional methods without NC; minimum cost routing in polynomial time using NC; BP (applies on trees and on general topologies) versus MINC-like heuristics (introduced in [8] only apply on trees) performance depends on number of sources (the more sources the better for both); the larger the loss rates, the slower the convergence of BP algorithm; BP performance increases as n increases |
Fan et al. [52] | CS with weighted minimization; weights are determined based on the prior congestion probabilities of links; outperforms (unweighted) minimization in terms of estimation accuracy, DR, and FPR |
Chen et al. [53] | greedy iterative estimation algorithm to locate congested links based on prior probabilities; recovered probability is not very accurate; DR is high, whereas FPR not very good; performance increases while congestion ratio decreases |
Takemoto et al. [54] | window-based sequential loss tomography scheme for networks with dynamically changing link loss rates; increases the sparsity of link loss rates by subtracting them from steady-state path loss rates; path construction algorithm between two monitors that maximizes identifiability |
Morita et al. [56] | estimates the GFT of a node state vector and uses CS to estimate packet loss rates in wireless networks with spatially dependent channels; spatial dependence does not imply strong correlation between neighboring nodes’ loss rates; limited applicability |
Bandara et al. [57] | monitors network for anomaly detection and localizes faulty links using CS; scalable ; cost-effective |
Fan et al. [45] | link delays as exponential random variables; additive Gaussian clock synchronization error; constrained optimization that outperforms the original one [60] in estimation error and detection probability |
Nakanishi et al. [46] | reflective NT with a single transceiver for identifying bottleneck links; efficient algorithm for constructing reflective (fully-loop and folded) paths; no clock synchronization required |
Nakanishi et al. [47] | synchronization-free delay tomography; differential routing matrix construction by selecting a path as reference; comparable performance to conventional delay schemes |
Kinsho et al. [48] | heterogeneous CS-based delay tomography in mobile networks; crowd-sourcing passive RTT measurements; estimates delays at BSs and at servers from the GFT of the vector of the spatial-dependent delays at BSs; the scheme captures the spatial dependence of delays and is robust to the presence of inactive BSs |
Wei et al. [49] | extends [50] to link delay estimation with dynamic link operations (i.e., insertion and deletion) and provides an algorithm with better theoretical upper bound on running time; topological constraints represented by a line graph model |
Error (RMSE) | Entropy | FPR | DR | |
---|---|---|---|---|
LA-NE [34] | [0.5%, 14.0%) | |||
LA-RS [35] | [0.5%, 15.0%) | |||
BP [37] | [2.0%, 15.0%) | (−320.0, −180.0) | ||
(−400.0, −230.0) | ||||
MINC-like heuristic [37] | (−350.0, −180.0) | |||
(−360.0, −200.0) | ||||
Fan et al. [52] | (20.0%, 30.0%] | (2.0%, 8.0%) | (75.0%, 100.0%] | |
Chen et al. [53] | (10.0%, 30.0%] | (70.0%, 100.0%) | ||
Takemoto et al. [54] | (99.5%, 100.0%) | |||
Bandara et al. [57] | [0, 1.0%] | [99.0%, 100.0%] | ||
Fan et al. [45] | [2.4%, 3.5%] | [0%, 12.0%) | [40.0%, 89.0%) | |
Nakanishi et al. [46] | [18.0%, 100.0%] | |||
Kinsho et al. [48] | <20.0% |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kakkavas, G.; Gkatzioura, D.; Karyotis, V.; Papavassiliou, S. A Review of Advanced Algebraic Approaches Enabling Network Tomography for Future Network Infrastructures. Future Internet 2020, 12, 20. https://doi.org/10.3390/fi12020020
Kakkavas G, Gkatzioura D, Karyotis V, Papavassiliou S. A Review of Advanced Algebraic Approaches Enabling Network Tomography for Future Network Infrastructures. Future Internet. 2020; 12(2):20. https://doi.org/10.3390/fi12020020
Chicago/Turabian StyleKakkavas, Grigorios, Despoina Gkatzioura, Vasileios Karyotis, and Symeon Papavassiliou. 2020. "A Review of Advanced Algebraic Approaches Enabling Network Tomography for Future Network Infrastructures" Future Internet 12, no. 2: 20. https://doi.org/10.3390/fi12020020
APA StyleKakkavas, G., Gkatzioura, D., Karyotis, V., & Papavassiliou, S. (2020). A Review of Advanced Algebraic Approaches Enabling Network Tomography for Future Network Infrastructures. Future Internet, 12(2), 20. https://doi.org/10.3390/fi12020020